last executing test programs: 7.066864587s ago: executing program 0 (id=965): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000001900)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001840)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}}], 0x1, 0x0, 0x0) close(r2) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFNL_MSG_CTHELPER_DEL(r2, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x14}, 0x14}}, 0x0) 6.711543915s ago: executing program 0 (id=966): r0 = socket$inet_icmp(0x2, 0x2, 0x1) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/power_supply', 0x0, 0x0) r1 = socket(0x1, 0x3, 0x0) recvmsg$inet_nvme(r1, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$KDGKBLED(r0, 0x5450, 0x0) 4.642243088s ago: executing program 1 (id=967): r0 = socket$unix(0x1, 0x3, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x3, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x200200, 0x0) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmsg$unix(r1, &(0x7f0000000680)={&(0x7f0000000000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e, 0x0}, 0x0) 3.992430842s ago: executing program 0 (id=968): r0 = eventfd2(0x0, 0x0) openat$incfs(0xffffffffffffff9c, &(0x7f0000000000)='.pending_reads\x00', 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001240)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname(r1, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f0000000080)=0x80) close(r2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x5450, 0x0) 3.909951417s ago: executing program 1 (id=969): r0 = openat$incfs(0xffffffffffffff9c, &(0x7f00000001c0)='.pending_reads\x00', 0x181042, 0x0) openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000011c0)={0xffffffffffffffff}) getsockname(r1, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private2}}}, &(0x7f0000000080)=0x80) close(r2) ioctl$BINDER_THREAD_EXIT(r0, 0x5450, 0x0) 3.760283036s ago: executing program 0 (id=970): r0 = socket$inet_tcp(0x2, 0x1, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f0000000080)='.pending_reads\x00', 0x0, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$BTRFS_IOC_INO_PATHS(r0, 0x5450, 0x0) 3.512134163s ago: executing program 1 (id=971): r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='.\x00', 0x0, 0x0) r1 = dup(r0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup3(r1, r2, 0x0) mkdirat(r2, &(0x7f00000000c0)='./file0\x00', 0x0) openat(r3, &(0x7f0000000000)='./file0\x00', 0x200200, 0x1) 2.900868559s ago: executing program 1 (id=972): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup3(r1, r0, 0x0) r2 = signalfd(0xffffffffffffffff, &(0x7f00000024c0), 0x8) dup3(r0, r2, 0x0) connect$inet6(r2, &(0x7f00000002c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}}, 0x1c) 2.650416036s ago: executing program 1 (id=973): r0 = epoll_create1(0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) recvmsg(r1, &(0x7f0000000180)={&(0x7f0000000080)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$KDGKBENT(r0, 0x5451, 0x0) 1.010257948s ago: executing program 0 (id=974): r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockname(r0, &(0x7f00000002c0)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @private}}}, &(0x7f00000001c0)=0x80) dup3(r0, r1, 0x0) connect$inet6(r1, &(0x7f0000000140)={0xa, 0x4e20, 0x0, @empty}, 0x1c) getpeername(r1, &(0x7f0000000000)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @remote}}}, &(0x7f0000000080)=0x80) setsockopt$inet_mreq(r2, 0x0, 0x20, &(0x7f0000000000)={@broadcast, @local}, 0x8) 860.377366ms ago: executing program 0 (id=975): r0 = open(&(0x7f0000000040)='.\x00', 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/devices/system', 0x0, 0x0) r1 = socket(0x1, 0x3, 0x0) recvmsg$inet_nvme(r1, &(0x7f00000014c0)={&(0x7f0000000080)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @mcast2}}}, 0x80, 0x0}, 0x0) close(r2) ioctl$KDGKBSENT(r0, 0x5450, 0x0) 0s ago: executing program 1 (id=976): r0 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000000c0)={'vxcan1\x00', 0x0}) bind$can_j1939(r0, &(0x7f0000000100)={0x1d, r1}, 0x18) connect$can_j1939(r0, &(0x7f0000000140)={0x1d, r1, 0x0, {0x0, 0xff}}, 0x18) sendmsg$can_j1939(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000005c0)='data', 0x62}}, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) kernel console output (not intermixed with test programs): [ 50.281237][ T31] audit: type=1400 audit(50.200:68): avc: denied { read write } for pid=3105 comm="sftp-server" name="null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 50.291369][ T31] audit: type=1400 audit(50.220:69): avc: denied { open } for pid=3105 comm="sftp-server" path="/dev/null" dev="devtmpfs" ino=4 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 Warning: Permanently added '[localhost]:47778' (ED25519) to the list of known hosts. [ 60.395456][ T31] audit: type=1400 audit(60.330:70): avc: denied { name_bind } for pid=3107 comm="sshd" src=30000 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 62.901264][ T31] audit: type=1400 audit(62.830:71): avc: denied { execute } for pid=3109 comm="sh" name="syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 62.926515][ T31] audit: type=1400 audit(62.860:72): avc: denied { execute_no_trans } for pid=3109 comm="sh" path="/syz-executor" dev="vda" ino=680 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:etc_runtime_t tclass=file permissive=1 [ 66.272095][ T31] audit: type=1400 audit(66.210:73): avc: denied { mounton } for pid=3109 comm="syz-executor" path="/syzcgroup/unified" dev="vda" ino=681 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 66.274668][ T31] audit: type=1400 audit(66.210:74): avc: denied { mount } for pid=3109 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.287877][ T3109] cgroup: Unknown subsys name 'net' [ 66.295460][ T31] audit: type=1400 audit(66.230:75): avc: denied { unmount } for pid=3109 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 66.489424][ T3109] cgroup: Unknown subsys name 'hugetlb' [ 66.490005][ T3109] cgroup: Unknown subsys name 'rlimit' [ 66.750210][ T31] audit: type=1400 audit(66.680:76): avc: denied { setattr } for pid=3109 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=707 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 66.765189][ T31] audit: type=1400 audit(66.690:77): avc: denied { mounton } for pid=3109 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 66.766063][ T31] audit: type=1400 audit(66.690:78): avc: denied { mount } for pid=3109 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 [ 66.989938][ T3111] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 66.992053][ T31] audit: type=1400 audit(66.930:79): avc: denied { relabelto } for pid=3111 comm="mkswap" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 66.998583][ T31] audit: type=1400 audit(66.930:80): avc: denied { write } for pid=3111 comm="mkswap" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" Setting up swapspace version 1, size = 127995904 bytes [ 67.021431][ T31] audit: type=1400 audit(66.950:81): avc: denied { read } for pid=3109 comm="syz-executor" name="swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 67.022253][ T31] audit: type=1400 audit(66.950:82): avc: denied { open } for pid=3109 comm="syz-executor" path="/swap-file" dev="vda" ino=684 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 73.754320][ T3109] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 75.721428][ T31] audit: type=1400 audit(75.650:83): avc: denied { execmem } for pid=3112 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 75.783857][ T31] audit: type=1400 audit(75.720:84): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/sys/fs/fuse/connections" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=dir permissive=1 [ 75.784698][ T31] audit: type=1400 audit(75.720:85): avc: denied { mount } for pid=3114 comm="syz-executor" name="/" dev="fusectl" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 75.791150][ T31] audit: type=1400 audit(75.720:86): avc: denied { read } for pid=3114 comm="syz-executor" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.791883][ T31] audit: type=1400 audit(75.720:87): avc: denied { open } for pid=3114 comm="syz-executor" path="net:[4026531840]" dev="nsfs" ino=4026531840 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 75.801162][ T31] audit: type=1400 audit(75.730:88): avc: denied { mounton } for pid=3114 comm="syz-executor" path="/" dev="vda" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 75.823007][ T31] audit: type=1400 audit(75.760:89): avc: denied { module_request } for pid=3115 comm="syz-executor" kmod="netdev-nr1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.823723][ T31] audit: type=1400 audit(75.760:90): avc: denied { module_request } for pid=3114 comm="syz-executor" kmod="netdev-nr0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 75.916878][ T31] audit: type=1400 audit(75.850:91): avc: denied { sys_module } for pid=3114 comm="syz-executor" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 76.597251][ T31] audit: type=1400 audit(76.530:92): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/net/tun" dev="devtmpfs" ino=691 ioctlcmd=0x54ca scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 77.643316][ T3115] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 77.654721][ T3115] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.037956][ T3114] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 78.048452][ T3114] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 78.621842][ T3115] hsr_slave_0: entered promiscuous mode [ 78.624253][ T3115] hsr_slave_1: entered promiscuous mode [ 78.928820][ T3115] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 78.954108][ T3115] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 78.962937][ T3115] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 78.973291][ T3115] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 79.159486][ T3114] hsr_slave_0: entered promiscuous mode [ 79.168398][ T3114] hsr_slave_1: entered promiscuous mode [ 79.170474][ T3114] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 79.174205][ T3114] Cannot create hsr debugfs directory [ 79.545543][ T3114] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 79.554048][ T3114] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 79.565958][ T3114] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 79.574805][ T3114] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 79.755428][ T3115] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.438528][ T3114] 8021q: adding VLAN 0 to HW filter on device bond0 [ 80.500053][ T3115] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 82.816702][ T3115] veth0_vlan: entered promiscuous mode [ 82.834412][ T3115] veth1_vlan: entered promiscuous mode [ 82.876265][ T3115] veth0_macvtap: entered promiscuous mode [ 82.885057][ T3115] veth1_macvtap: entered promiscuous mode [ 82.926929][ T3115] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.927596][ T3115] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.927973][ T3115] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 82.928323][ T3115] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 83.115779][ T31] kauditd_printk_skb: 3 callbacks suppressed [ 83.115892][ T31] audit: type=1400 audit(83.050:96): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 83.118752][ T31] audit: type=1400 audit(83.050:97): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/syzkaller.1wDmQW/syz-tmp/newroot/dev" dev="tmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 83.126692][ T31] audit: type=1400 audit(83.060:98): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 83.151864][ T31] audit: type=1400 audit(83.080:99): avc: denied { unmount } for pid=3115 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 83.153782][ T31] audit: type=1400 audit(83.090:100): avc: denied { mounton } for pid=3115 comm="syz-executor" path="/dev/binderfs" dev="devtmpfs" ino=779 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 83.157719][ T31] audit: type=1400 audit(83.090:101): avc: denied { mount } for pid=3115 comm="syz-executor" name="/" dev="binder" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 83.341923][ T31] audit: type=1400 audit(83.270:102): avc: denied { read write } for pid=3115 comm="syz-executor" name="loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.342781][ T31] audit: type=1400 audit(83.270:103): avc: denied { open } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 83.343628][ T31] audit: type=1400 audit(83.270:104): avc: denied { ioctl } for pid=3115 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=636 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 84.000991][ T3114] veth0_vlan: entered promiscuous mode [ 84.011845][ T3114] veth1_vlan: entered promiscuous mode [ 84.046702][ T3114] veth0_macvtap: entered promiscuous mode [ 84.055446][ T3114] veth1_macvtap: entered promiscuous mode [ 84.108213][ T3114] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.108794][ T3114] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.109134][ T3114] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.109450][ T3114] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 84.592446][ T31] audit: type=1400 audit(84.530:105): avc: denied { create } for pid=3799 comm="syz.0.3" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 88.710795][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 88.710854][ T31] audit: type=1400 audit(88.640:108): avc: denied { create } for pid=3826 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 88.714307][ T31] audit: type=1400 audit(88.650:109): avc: denied { bind } for pid=3826 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 88.716288][ T31] audit: type=1400 audit(88.650:110): avc: denied { setopt } for pid=3826 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 88.719117][ T31] audit: type=1400 audit(88.650:111): avc: denied { accept } for pid=3826 comm="syz.0.15" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 91.910885][ T31] audit: type=1400 audit(91.840:112): avc: denied { write } for pid=3856 comm="syz.1.27" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 92.937007][ T31] audit: type=1400 audit(92.870:113): avc: denied { create } for pid=3870 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.953081][ T31] audit: type=1400 audit(92.890:114): avc: denied { ioctl } for pid=3870 comm="syz.0.34" path="socket:[2489]" dev="sockfs" ino=2489 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.963948][ T31] audit: type=1400 audit(92.900:115): avc: denied { bind } for pid=3870 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 92.968435][ T31] audit: type=1400 audit(92.900:116): avc: denied { write } for pid=3870 comm="syz.0.34" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 94.171888][ T31] audit: type=1400 audit(94.100:117): avc: denied { name_bind } for pid=3877 comm="syz.0.37" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 94.172940][ T31] audit: type=1400 audit(94.100:118): avc: denied { node_bind } for pid=3877 comm="syz.0.37" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 96.031230][ T31] audit: type=1400 audit(95.960:119): avc: denied { create } for pid=3884 comm="syz.1.40" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 96.034832][ T31] audit: type=1400 audit(95.970:120): avc: denied { create } for pid=3884 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 96.036946][ T31] audit: type=1400 audit(95.970:121): avc: denied { connect } for pid=3884 comm="syz.1.40" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 96.544426][ T31] audit: type=1400 audit(96.480:122): avc: denied { ioctl } for pid=3884 comm="syz.1.40" path="socket:[2524]" dev="sockfs" ino=2524 ioctlcmd=0x890b scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 98.424168][ T31] audit: type=1400 audit(98.360:123): avc: denied { create } for pid=3896 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.427107][ T31] audit: type=1400 audit(98.360:124): avc: denied { setopt } for pid=3896 comm="syz.1.45" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 98.999240][ T31] audit: type=1400 audit(98.930:125): avc: denied { read } for pid=3907 comm="syz.0.51" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 99.262191][ T31] audit: type=1400 audit(99.190:126): avc: denied { create } for pid=3926 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 99.273755][ T31] audit: type=1400 audit(99.200:127): avc: denied { read } for pid=3926 comm="syz.1.59" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 99.385228][ T31] audit: type=1400 audit(99.320:128): avc: denied { prog_load } for pid=3930 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.387722][ T31] audit: type=1400 audit(99.320:129): avc: denied { bpf } for pid=3930 comm="syz.1.61" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 99.401689][ T31] audit: type=1400 audit(99.330:130): avc: denied { perfmon } for pid=3930 comm="syz.1.61" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 99.422639][ T31] audit: type=1400 audit(99.360:131): avc: denied { prog_run } for pid=3930 comm="syz.1.61" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 99.604082][ T31] audit: type=1400 audit(99.540:132): avc: denied { create } for pid=3933 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 99.604425][ T3934] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 99.645273][ T31] audit: type=1400 audit(99.580:133): avc: denied { getopt } for pid=3933 comm="syz.0.62" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 102.492138][ T3951] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=3951 comm=syz.1.69 [ 102.889030][ T31] audit: type=1400 audit(102.820:134): avc: denied { read } for pid=3952 comm="syz.1.70" name="binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 102.902150][ T31] audit: type=1400 audit(102.840:135): avc: denied { open } for pid=3952 comm="syz.1.70" path="/dev/binderfs/binder-control" dev="binder" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 105.772037][ T31] kauditd_printk_skb: 1 callbacks suppressed [ 105.772163][ T31] audit: type=1400 audit(105.710:137): avc: denied { setopt } for pid=3978 comm="syz.1.82" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 107.296302][ T31] audit: type=1400 audit(107.230:138): avc: denied { create } for pid=4026 comm="syz.0.105" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 107.493012][ T31] audit: type=1400 audit(107.430:139): avc: denied { create } for pid=4032 comm="syz.0.108" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 107.497234][ T31] audit: type=1400 audit(107.430:140): avc: denied { ioctl } for pid=4032 comm="syz.0.108" path="socket:[3286]" dev="sockfs" ino=3286 ioctlcmd=0x89a0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 107.841222][ T31] audit: type=1400 audit(107.770:141): avc: denied { block_suspend } for pid=4038 comm="syz.0.110" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 108.004675][ T31] audit: type=1400 audit(107.940:142): avc: denied { setopt } for pid=4046 comm="syz.0.112" lport=2 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 108.055820][ T31] audit: type=1400 audit(107.990:143): avc: denied { create } for pid=4048 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 108.060327][ T31] audit: type=1400 audit(107.990:144): avc: denied { read } for pid=4048 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 108.068324][ T31] audit: type=1400 audit(108.000:145): avc: denied { write } for pid=4048 comm="syz.0.113" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 108.152964][ T31] audit: type=1400 audit(108.090:146): avc: denied { map_create } for pid=4051 comm="syz.1.115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 115.070906][ T31] kauditd_printk_skb: 2 callbacks suppressed [ 115.071059][ T31] audit: type=1400 audit(115.000:149): avc: denied { map } for pid=4108 comm="syz.0.142" path="pipe:[3443]" dev="pipefs" ino=3443 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=fifo_file permissive=1 [ 125.510291][ T4124] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4124 comm=syz.0.148 [ 126.256915][ T4134] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=1 sclass=netlink_audit_socket pid=4134 comm=syz.0.153 [ 126.986461][ T31] audit: type=1400 audit(126.920:150): avc: denied { write } for pid=4135 comm="syz.0.154" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 134.360877][ T31] audit: type=1400 audit(134.290:151): avc: denied { connect } for pid=4171 comm="syz.0.171" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 134.361482][ T31] audit: type=1400 audit(134.290:152): avc: denied { name_connect } for pid=4171 comm="syz.0.171" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=sctp_socket permissive=1 [ 134.372673][ T31] audit: type=1400 audit(134.310:153): avc: denied { listen } for pid=4171 comm="syz.0.171" lport=52286 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 134.576106][ T31] audit: type=1400 audit(134.510:154): avc: denied { accept } for pid=4171 comm="syz.0.171" lport=52286 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 136.881884][ T1483] usb 1-1: new high-speed USB device number 2 using dummy_hcd [ 137.085333][ T1483] usb 1-1: config 41 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 137.087821][ T1483] usb 1-1: New USB device found, idVendor=0926, idProduct=3333, bcdDevice= 0.40 [ 137.089432][ T1483] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 137.528897][ T4184] raw-gadget.0 gadget.0: fail, usb_ep_set_wedge returned -11 [ 137.542287][ T1483] usbhid 1-1:41.0: can't add hid device: -71 [ 137.543122][ T1483] usbhid 1-1:41.0: probe with driver usbhid failed with error -71 [ 137.559529][ T1483] usb 1-1: USB disconnect, device number 2 [ 137.868206][ T31] audit: type=1400 audit(137.800:155): avc: denied { execute } for pid=4201 comm="syz.0.178" path="/112/cpu.stat" dev="tmpfs" ino=604 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 138.059667][ T31] audit: type=1400 audit(137.990:156): avc: denied { watch } for pid=4205 comm="syz.0.180" path="/114" dev="tmpfs" ino=611 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 139.386730][ T31] audit: type=1400 audit(139.320:157): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 139.593414][ T31] audit: type=1400 audit(139.530:158): avc: denied { create } for pid=4221 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 139.596368][ T31] audit: type=1400 audit(139.530:159): avc: denied { write } for pid=4221 comm="syz.0.186" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 141.727188][ T4211] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 141.735423][ T4211] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 142.865140][ T4211] hsr_slave_0: entered promiscuous mode [ 142.867116][ T4211] hsr_slave_1: entered promiscuous mode [ 142.868479][ T4211] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 142.868842][ T4211] Cannot create hsr debugfs directory [ 143.119907][ T4211] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 143.227267][ T4211] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 143.289466][ T4211] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 143.341363][ T4211] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 143.446075][ T4211] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 143.457152][ T4211] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 143.469350][ T4211] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 143.481083][ T4211] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 144.848052][ T4211] 8021q: adding VLAN 0 to HW filter on device bond0 [ 149.905901][ T4211] veth0_vlan: entered promiscuous mode [ 149.926647][ T4211] veth1_vlan: entered promiscuous mode [ 149.987335][ T4211] veth0_macvtap: entered promiscuous mode [ 149.996179][ T4211] veth1_macvtap: entered promiscuous mode [ 150.279756][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 150.299541][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 150.305507][ T11] bond0 (unregistering): Released all slaves [ 150.346406][ T4211] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.347018][ T4211] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.347367][ T4211] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.347740][ T4211] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 150.405669][ T11] hsr_slave_0: left promiscuous mode [ 150.409532][ T11] hsr_slave_1: left promiscuous mode [ 150.419230][ T11] veth1_macvtap: left promiscuous mode [ 150.419891][ T11] veth0_macvtap: left promiscuous mode [ 150.420348][ T11] veth1_vlan: left promiscuous mode [ 150.422304][ T11] veth0_vlan: left promiscuous mode [ 151.027778][ T31] audit: type=1400 audit(150.960:160): avc: denied { ioctl } for pid=4625 comm="syz.1.211" path="socket:[4018]" dev="sockfs" ino=4018 ioctlcmd=0x5005 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 155.000429][ T31] audit: type=1400 audit(154.930:161): avc: denied { getopt } for pid=4665 comm="syz.0.228" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 158.616543][ T31] audit: type=1400 audit(158.550:162): avc: denied { setopt } for pid=4678 comm="syz.0.233" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 158.704471][ T31] audit: type=1400 audit(158.640:163): avc: denied { create } for pid=4680 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 158.710011][ T31] audit: type=1400 audit(158.640:164): avc: denied { bind } for pid=4680 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 158.715189][ T31] audit: type=1400 audit(158.650:165): avc: denied { connect } for pid=4680 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 158.727376][ T31] audit: type=1400 audit(158.660:166): avc: denied { listen } for pid=4680 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 158.731546][ T31] audit: type=1400 audit(158.660:167): avc: denied { accept } for pid=4680 comm="syz.0.234" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 161.137204][ T31] audit: type=1400 audit(161.070:168): avc: denied { ioctl } for pid=4682 comm="syz.0.235" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=4428 ioctlcmd=0xaa3f scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 161.251717][ T3787] usb 2-1: new high-speed USB device number 2 using dummy_hcd [ 161.438979][ T3787] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 161.439700][ T3787] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 255, changing to 11 [ 161.440182][ T3787] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid maxpacket 59391, setting to 1024 [ 161.447348][ T3787] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 161.448050][ T3787] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 161.448407][ T3787] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 161.456762][ T3787] usb 2-1: config 0 descriptor?? [ 161.463159][ T4699] raw-gadget.0 gadget.1: fail, usb_ep_enable returned -22 [ 161.572839][ T31] audit: type=1400 audit(161.500:169): avc: denied { create } for pid=4710 comm="syz.0.245" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 161.588450][ T31] audit: type=1400 audit(161.510:170): avc: denied { ioctl } for pid=4710 comm="syz.0.245" path="socket:[4446]" dev="sockfs" ino=4446 ioctlcmd=0x89f1 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 161.909961][ T3787] plantronics 0003:047F:FFFF.0001: No inputs registered, leaving [ 161.919078][ T3787] plantronics 0003:047F:FFFF.0001: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 163.341397][ T3796] usb 2-1: reset high-speed USB device number 2 using dummy_hcd [ 164.161477][ T31] audit: type=1400 audit(164.090:171): avc: denied { write } for pid=4741 comm="syz.0.255" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 168.521823][ T3796] usb 2-1: device descriptor read/64, error -110 [ 168.570939][ C0] hrtimer: interrupt took 496288 ns [ 168.791443][ T3796] usb 2-1: reset high-speed USB device number 2 using dummy_hcd [ 168.951884][ T3796] usb 2-1: device descriptor read/64, error -32 [ 169.221491][ T3796] usb 2-1: reset high-speed USB device number 2 using dummy_hcd [ 169.252166][ T3796] usb 2-1: device descriptor read/8, error -32 [ 169.521947][ T3796] usb 2-1: reset high-speed USB device number 2 using dummy_hcd [ 169.552048][ T3796] usb 2-1: device descriptor read/8, error -32 [ 169.671944][ T3796] raw-gadget.0 gadget.1: failed to queue suspend event [ 169.676026][ T50] usb 2-1: USB disconnect, device number 2 [ 169.701886][ T4698] raw-gadget.0 gadget.1: failed to queue disconnect event [ 170.511615][ T31] audit: type=1400 audit(170.440:172): avc: denied { mounton } for pid=4794 comm="syz.0.269" path="/176/file0" dev="tmpfs" ino=945 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 170.565851][ T31] audit: type=1400 audit(170.500:173): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 [ 172.015266][ T4816] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=65381 sclass=netlink_audit_socket pid=4816 comm=syz.1.277 [ 174.491194][ T31] audit: type=1400 audit(174.420:174): avc: denied { bind } for pid=4824 comm="syz.0.281" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 174.496151][ T31] audit: type=1400 audit(174.430:175): avc: denied { read } for pid=4824 comm="syz.0.281" path="socket:[4564]" dev="sockfs" ino=4564 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 176.777331][ T31] audit: type=1400 audit(176.710:176): avc: denied { getopt } for pid=4852 comm="syz.1.293" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 178.002325][ T4867] netlink: 4 bytes leftover after parsing attributes in process `syz.0.299'. [ 186.005339][ T31] audit: type=1400 audit(185.940:177): avc: denied { append } for pid=4888 comm="syz.0.308" name="amidi2" dev="devtmpfs" ino=749 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 188.311543][ T8] usb 1-1: new high-speed USB device number 3 using dummy_hcd [ 188.573886][ T8] usb 1-1: config 1 interface 0 altsetting 0 endpoint 0x3 has invalid maxpacket 12592, setting to 1024 [ 188.574884][ T8] usb 1-1: config 1 interface 0 altsetting 0 bulk endpoint 0x3 has invalid maxpacket 1024 [ 188.575322][ T8] usb 1-1: config 1 interface 0 altsetting 0 has 2 endpoint descriptors, different from the interface descriptor's value: 18 [ 188.597434][ T8] usb 1-1: New USB device found, idVendor=0525, idProduct=a4a1, bcdDevice= 0.40 [ 188.598004][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=1 [ 188.598337][ T8] usb 1-1: SerialNumber: syz [ 188.625952][ T4908] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 188.846987][ T4908] raw-gadget.0 gadget.0: fail, usb_ep_enable returned -22 [ 192.819730][ T8] cdc_ether 1-1:1.0 wwan0: register 'cdc_ether' at usb-dummy_hcd.0-1, Mobile Broadband Network Device, 42:42:42:42:42:42 [ 194.077614][ T8] usb 1-1: USB disconnect, device number 3 [ 194.079755][ T8] cdc_ether 1-1:1.0 wwan0: unregister 'cdc_ether' usb-dummy_hcd.0-1, Mobile Broadband Network Device [ 197.137731][ T31] audit: type=1400 audit(197.070:178): avc: denied { read } for pid=4982 comm="syz.0.334" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 200.621614][ T31] audit: type=1400 audit(200.550:179): avc: denied { map } for pid=5002 comm="syz.0.342" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5542 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 200.622636][ T31] audit: type=1400 audit(200.550:180): avc: denied { read write } for pid=5002 comm="syz.0.342" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=5542 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 200.908549][ T5007] Zero length message leads to an empty skb [ 201.152213][ T31] audit: type=1400 audit(201.090:181): avc: denied { remount } for pid=5010 comm="syz.0.346" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 201.191397][ T31] audit: type=1400 audit(201.120:182): avc: denied { unmount } for pid=3114 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 201.891245][ T31] audit: type=1400 audit(201.820:183): avc: denied { write } for pid=5024 comm="syz.0.353" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 201.892900][ T31] audit: type=1400 audit(201.820:184): avc: denied { name_connect } for pid=5024 comm="syz.0.353" dest=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 202.408266][ T31] audit: type=1400 audit(202.340:185): avc: denied { getopt } for pid=5024 comm="syz.0.353" lport=38184 faddr=fc00:: fport=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 204.833232][ T31] audit: type=1400 audit(204.760:186): avc: denied { mount } for pid=5031 comm="syz.0.356" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 212.975415][ T5066] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 212.992147][ T5066] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 215.687010][ T5066] hsr_slave_0: entered promiscuous mode [ 215.703590][ T5066] hsr_slave_1: entered promiscuous mode [ 216.385682][ T5066] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 216.474990][ T5066] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 216.533079][ T5066] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 216.629932][ T5066] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 216.893467][ T5066] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 216.917330][ T5066] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 216.937312][ T5066] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 216.959615][ T5066] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 217.951539][ T8] usb 1-1: new high-speed USB device number 4 using dummy_hcd [ 218.194806][ T8] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 218.195367][ T8] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 218.195859][ T8] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 218.196174][ T8] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 218.199869][ T8] usb 1-1: config 0 descriptor?? [ 218.630154][ T8] plantronics 0003:047F:FFFF.0002: No inputs registered, leaving [ 218.644394][ T8] plantronics 0003:047F:FFFF.0002: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 218.976588][ T50] usb 1-1: USB disconnect, device number 4 [ 219.078674][ T5066] 8021q: adding VLAN 0 to HW filter on device bond0 [ 220.884745][ T31] audit: type=1400 audit(220.820:187): avc: denied { write } for pid=5450 comm="syz.0.390" name="binder1" dev="binder" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 220.909294][ T5452] binder: 5450:5452 ioctl 40046205 0 returned -22 [ 220.911886][ T31] audit: type=1400 audit(220.840:188): avc: denied { ioctl } for pid=5450 comm="syz.0.390" path="/dev/binderfs/binder1" dev="binder" ino=8 ioctlcmd=0x6205 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 221.809614][ T31] audit: type=1400 audit(221.740:189): avc: denied { getattr } for pid=5467 comm="syz.0.395" path="anon_inode:[userfaultfd]" dev="anon_inodefs" ino=6170 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 223.422235][ T5066] veth0_vlan: entered promiscuous mode [ 223.447585][ T5066] veth1_vlan: entered promiscuous mode [ 223.497450][ T5066] veth0_macvtap: entered promiscuous mode [ 223.503638][ T5066] veth1_macvtap: entered promiscuous mode [ 223.597224][ T5066] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.597787][ T5066] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.598245][ T5066] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 223.598576][ T5066] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 225.400382][ T31] audit: type=1400 audit(225.330:190): avc: denied { connect } for pid=5511 comm="syz.1.408" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 227.122151][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 227.128999][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 227.146942][ T11] bond0 (unregistering): Released all slaves [ 227.245242][ T11] hsr_slave_0: left promiscuous mode [ 227.248505][ T11] hsr_slave_1: left promiscuous mode [ 227.261855][ T11] veth1_macvtap: left promiscuous mode [ 227.262380][ T11] veth0_macvtap: left promiscuous mode [ 227.262769][ T11] veth1_vlan: left promiscuous mode [ 227.263415][ T11] veth0_vlan: left promiscuous mode [ 228.420030][ T31] audit: type=1400 audit(228.350:191): avc: denied { create } for pid=5546 comm="syz.1.423" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 228.430298][ T31] audit: type=1400 audit(228.360:192): avc: denied { ioctl } for pid=5546 comm="syz.1.423" path="socket:[5983]" dev="sockfs" ino=5983 ioctlcmd=0x542f scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 230.161462][ T3796] usb 2-1: new high-speed USB device number 4 using dummy_hcd [ 230.363325][ T3796] usb 2-1: config 0 interface 0 altsetting 0 has an endpoint descriptor with address 0xFF, changing to 0x8F [ 230.364053][ T3796] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has an invalid bInterval 0, changing to 7 [ 230.364682][ T3796] usb 2-1: config 0 interface 0 altsetting 0 endpoint 0x8F has invalid wMaxPacketSize 0 [ 230.365206][ T3796] usb 2-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 230.365882][ T3796] usb 2-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 230.366392][ T3796] usb 2-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 230.373840][ T3796] usb 2-1: config 0 descriptor?? [ 230.799073][ T3796] plantronics 0003:047F:FFFF.0003: No inputs registered, leaving [ 230.806633][ T3796] plantronics 0003:047F:FFFF.0003: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.1-1/input0 [ 233.812989][ T31] audit: type=1400 audit(233.750:193): avc: denied { setopt } for pid=5592 comm="syz.0.439" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 233.889989][ T31] audit: type=1400 audit(233.820:194): avc: denied { create } for pid=5594 comm="syz.0.440" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 235.807646][ T31] audit: type=1400 audit(235.740:195): avc: denied { ioctl } for pid=5634 comm="syz.1.458" path="socket:[6086]" dev="sockfs" ino=6086 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 236.017666][ T31] audit: type=1400 audit(235.950:196): avc: denied { read } for pid=5638 comm="syz.1.460" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 236.464579][ T3796] usb 2-1: USB disconnect, device number 4 [ 244.123034][ T31] audit: type=1400 audit(244.060:197): avc: denied { getopt } for pid=5716 comm="syz.1.488" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 245.863786][ T31] audit: type=1400 audit(245.800:198): avc: denied { name_bind } for pid=5730 comm="syz.1.494" src=3617 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 248.825948][ T5778] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=5778 comm=syz.0.515 [ 249.956671][ T5792] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=5792 comm=syz.0.526 [ 260.697921][ T31] audit: type=1400 audit(260.630:199): avc: denied { nlmsg_write } for pid=5890 comm="syz.1.567" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 266.957098][ T31] audit: type=1400 audit(266.890:200): avc: denied { write } for pid=5930 comm="syz.1.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 266.958593][ T31] audit: type=1400 audit(266.890:201): avc: denied { nlmsg_write } for pid=5930 comm="syz.1.585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 276.306061][ T6014] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=5135 sclass=netlink_audit_socket pid=6014 comm=syz.1.624 [ 280.907472][ T31] audit: type=1326 audit(280.840:202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6034 comm="syz.1.632" exe="/syz-executor" sig=31 arch=40000028 syscall=240 compat=0 ip=0x132da0 code=0x0 [ 282.184696][ T31] audit: type=1400 audit(282.120:203): avc: denied { mount } for pid=6041 comm="syz.0.634" name="/" dev="ramfs" ino=7644 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ramfs_t tclass=filesystem permissive=1 [ 285.606963][ T31] audit: type=1400 audit(285.540:204): avc: denied { read } for pid=6067 comm="syz.0.644" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 287.689665][ T31] audit: type=1400 audit(287.620:205): avc: denied { name_connect } for pid=6088 comm="syz.0.653" dest=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=sctp_socket permissive=1 [ 291.618841][ T31] audit: type=1400 audit(291.550:206): avc: denied { write } for pid=6152 comm="syz.0.682" path="socket:[7867]" dev="sockfs" ino=7867 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 301.277443][ T6219] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6219 comm=syz.1.711 [ 301.961748][ T3742] usb 1-1: new high-speed USB device number 5 using dummy_hcd [ 302.149135][ T3742] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has an invalid bInterval 0, changing to 7 [ 302.154565][ T3742] usb 1-1: config 0 interface 0 altsetting 0 endpoint 0x81 has invalid wMaxPacketSize 0 [ 302.157957][ T3742] usb 1-1: config 0 interface 0 altsetting 0 has 1 endpoint descriptor, different from the interface descriptor's value: 21 [ 302.158582][ T3742] usb 1-1: New USB device found, idVendor=047f, idProduct=ffff, bcdDevice= 0.00 [ 302.158962][ T3742] usb 1-1: New USB device strings: Mfr=0, Product=0, SerialNumber=0 [ 302.169178][ T3742] usb 1-1: config 0 descriptor?? [ 302.598046][ T3742] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 302.598730][ T3742] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 302.599025][ T3742] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 302.599314][ T3742] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 302.599651][ T3742] plantronics 0003:047F:FFFF.0004: unknown main item tag 0x0 [ 302.600256][ T3742] plantronics 0003:047F:FFFF.0004: No inputs registered, leaving [ 302.604832][ T3742] plantronics 0003:047F:FFFF.0004: hiddev0,hidraw0: USB HID v0.40 Device [HID 047f:ffff] on usb-dummy_hcd.0-1/input0 [ 304.734789][ T3787] usb 1-1: USB disconnect, device number 5 [ 308.123037][ T31] audit: type=1400 audit(308.060:207): avc: denied { ioctl } for pid=6293 comm="syz.0.737" path="socket:[8083]" dev="sockfs" ino=8083 ioctlcmd=0x4504 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=alg_socket permissive=1 [ 314.623141][ T31] audit: type=1400 audit(314.560:208): avc: denied { audit_write } for pid=6372 comm="syz.1.773" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 316.306242][ T6390] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6390 comm=syz.1.781 [ 320.117571][ T31] audit: type=1400 audit(320.050:209): avc: denied { write } for pid=6418 comm="syz.1.794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 326.257246][ T6465] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=125 sclass=netlink_audit_socket pid=6465 comm=syz.1.816 [ 327.677702][ T31] audit: type=1400 audit(327.610:210): avc: denied { write } for pid=6472 comm="syz.1.820" path="socket:[9460]" dev="sockfs" ino=9460 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 339.557329][ T31] audit: type=1400 audit(339.490:211): avc: denied { setopt } for pid=6545 comm="syz.1.852" lport=38325 faddr=::ffff:172.20.255.187 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=sctp_socket permissive=1 [ 342.889489][ T6556] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 342.913675][ T6556] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 344.166905][ T6556] hsr_slave_0: entered promiscuous mode [ 344.182164][ T6556] hsr_slave_1: entered promiscuous mode [ 344.184927][ T6556] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 344.185371][ T6556] Cannot create hsr debugfs directory [ 344.546646][ T6556] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.627185][ T6556] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.685910][ T6556] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.750126][ T6556] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 344.869702][ T6556] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 344.882120][ T6556] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 344.889911][ T6556] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 344.902514][ T6556] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 345.906771][ T6556] 8021q: adding VLAN 0 to HW filter on device bond0 [ 348.894453][ T6556] veth0_vlan: entered promiscuous mode [ 348.926409][ T6556] veth1_vlan: entered promiscuous mode [ 349.000244][ T6556] veth0_macvtap: entered promiscuous mode [ 349.023878][ T6556] veth1_macvtap: entered promiscuous mode [ 349.094996][ T6556] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.095496][ T6556] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.095779][ T6556] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 349.096077][ T6556] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 360.264990][ T6980] syz.1.885 uses obsolete (PF_INET,SOCK_PACKET) [ 363.003557][ T4618] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 363.008872][ T4618] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 363.012660][ T4618] bond0 (unregistering): Released all slaves [ 363.076681][ T4618] hsr_slave_0: left promiscuous mode [ 363.078773][ T4618] hsr_slave_1: left promiscuous mode [ 363.089392][ T4618] veth1_macvtap: left promiscuous mode [ 363.089916][ T4618] veth0_macvtap: left promiscuous mode [ 363.090298][ T4618] veth1_vlan: left promiscuous mode [ 363.093252][ T4618] veth0_vlan: left promiscuous mode [ 363.866177][ T7003] input: syz0 as /devices/virtual/input/input3 [ 364.497392][ T7008] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=7008 comm=syz.0.894 [ 397.047812][ T7079] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 397.056813][ T7079] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 398.166893][ T7079] hsr_slave_0: entered promiscuous mode [ 398.171662][ T7079] hsr_slave_1: entered promiscuous mode [ 398.173202][ T7079] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 398.173563][ T7079] Cannot create hsr debugfs directory [ 398.618147][ T7079] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.769604][ T7079] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.842823][ T7079] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 398.883094][ T7079] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 399.068075][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 399.077958][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 399.086890][ T11] bond0 (unregistering): Released all slaves [ 399.139742][ T7079] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 399.164774][ T11] hsr_slave_0: left promiscuous mode [ 399.166958][ T11] hsr_slave_1: left promiscuous mode [ 399.174672][ T11] veth1_macvtap: left promiscuous mode [ 399.175070][ T11] veth0_macvtap: left promiscuous mode [ 399.175424][ T11] veth1_vlan: left promiscuous mode [ 399.175683][ T11] veth0_vlan: left promiscuous mode [ 399.479643][ T7079] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 399.490097][ T7079] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 399.497059][ T7079] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 400.226674][ T7079] 8021q: adding VLAN 0 to HW filter on device bond0 [ 403.020358][ T7079] veth0_vlan: entered promiscuous mode [ 403.052266][ T7079] veth1_vlan: entered promiscuous mode [ 403.125198][ T7079] veth0_macvtap: entered promiscuous mode [ 403.135998][ T7079] veth1_macvtap: entered promiscuous mode [ 403.197156][ T7079] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.197886][ T7079] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.198412][ T7079] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.198802][ T7079] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 403.464268][ T31] audit: type=1400 audit(403.400:212): avc: denied { write } for pid=7428 comm="syz.1.924" path="socket:[11564]" dev="sockfs" ino=11564 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 403.667656][ T31] audit: type=1400 audit(403.600:213): avc: denied { read } for pid=7432 comm="syz.1.926" name="/" dev="configfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 403.674616][ T31] audit: type=1400 audit(403.600:214): avc: denied { open } for pid=7432 comm="syz.1.926" path="/sys/kernel/config" dev="configfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 403.676946][ T7433] capability: warning: `syz.1.926' uses deprecated v2 capabilities in a way that may be insecure [ 403.679300][ T31] audit: type=1400 audit(403.610:215): avc: denied { setattr } for pid=7432 comm="syz.1.926" name="/" dev="configfs" ino=92 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 404.393181][ C0] TCP: request_sock_TCP: Possible SYN flooding on port 0.0.0.0:20002. Sending cookies. [ 411.107874][ T7446] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 411.112375][ T7446] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 411.768471][ T7446] hsr_slave_0: entered promiscuous mode [ 411.771787][ T7446] hsr_slave_1: entered promiscuous mode [ 411.936270][ T7446] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 411.968972][ T7446] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.033356][ T7446] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.087153][ T7446] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 412.228819][ T7446] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 412.238305][ T7446] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 412.249141][ T7446] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 412.258517][ T7446] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 413.095025][ T7446] 8021q: adding VLAN 0 to HW filter on device bond0 [ 416.437573][ T11] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 416.454072][ T11] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 416.457953][ T11] bond0 (unregistering): Released all slaves [ 416.545346][ T11] hsr_slave_0: left promiscuous mode [ 416.548797][ T11] hsr_slave_1: left promiscuous mode [ 416.556983][ T11] veth1_macvtap: left promiscuous mode [ 416.557473][ T11] veth0_macvtap: left promiscuous mode [ 416.557906][ T11] veth1_vlan: left promiscuous mode [ 416.558245][ T11] veth0_vlan: left promiscuous mode [ 416.964297][ T7446] veth0_vlan: entered promiscuous mode [ 416.985877][ T7446] veth1_vlan: entered promiscuous mode [ 417.062720][ T7446] veth0_macvtap: entered promiscuous mode [ 417.075120][ T7446] veth1_macvtap: entered promiscuous mode [ 417.147618][ T7446] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 417.148368][ T7446] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 417.148895][ T7446] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 417.149240][ T7446] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 429.141529][ T31] audit: type=1400 audit(429.070:216): avc: denied { ioctl } for pid=7916 comm="syz.0.966" path="socket:[10801]" dev="sockfs" ino=10801 ioctlcmd=0x5450 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 435.226615][ T31] audit: type=1400 audit(435.160:217): avc: denied { connect } for pid=7940 comm="syz.1.976" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 436.484121][ C1] vxcan1: j1939_tp_rxtimer: 0x85418700: rx timeout, send abort [ 436.486120][ C1] vxcan1: j1939_xtp_rx_abort_one: 0x85418700: 0x0ff00: (3) A timeout occurred and this is the connection abort to close the session. [ 436.487103][ C1] ------------[ cut here ]------------ [ 436.487412][ C1] WARNING: CPU: 1 PID: 23 at lib/refcount.c:28 refcount_warn_saturate+0x13c/0x174 [ 436.488104][ C1] refcount_t: underflow; use-after-free. [ 436.488314][ C1] Modules linked in: [ 436.488923][ C1] Kernel panic - not syncing: kernel: panic_on_warn set ... [ 436.489943][ C1] CPU: 1 UID: 0 PID: 23 Comm: ksoftirqd/1 Not tainted 6.11.0-syzkaller #0 [ 436.490637][ C1] Hardware name: ARM-Versatile Express [ 436.491412][ C1] Call trace: [ 436.491707][ C1] [<81966cb8>] (dump_backtrace) from [<81966db4>] (show_stack+0x18/0x1c) [ 436.492465][ C1] r7:00000000 r6:826228c4 r5:00000000 r4:8200e404 [ 436.492691][ C1] [<81966d9c>] (show_stack) from [<81984a58>] (dump_stack_lvl+0x54/0x7c) [ 436.492990][ C1] [<81984a04>] (dump_stack_lvl) from [<81984a98>] (dump_stack+0x18/0x1c) [ 436.493237][ C1] r5:00000000 r4:8286ed18 [ 436.493367][ C1] [<81984a80>] (dump_stack) from [<8196785c>] (panic+0x120/0x368) [ 436.493615][ C1] [<8196773c>] (panic) from [<802421d4>] (get_taint+0x0/0x1c) [ 436.493857][ C1] r3:8260c5c4 r2:00000001 r1:81ff6c38 r0:81ffea04 [ 436.494099][ C1] r7:8081a110 [ 436.494257][ C1] [<80242160>] (check_panic_on_warn) from [<80242328>] (__warn+0x7c/0x180) [ 436.494558][ C1] [<802422ac>] (__warn) from [<80242614>] (warn_slowpath_fmt+0x1e8/0x1f4) [ 436.494890][ C1] r8:00000009 r7:8205cdc4 r6:df879bd4 r5:82e42400 r4:00000000 [ 436.495149][ C1] [<80242430>] (warn_slowpath_fmt) from [<8081a110>] (refcount_warn_saturate+0x13c/0x174) [ 436.495547][ C1] r10:ddde4ec8 r9:00000003 r8:00000001 r7:00000000 r6:817f4e34 r5:00000002 [ 436.495844][ C1] r4:838ed0c0 [ 436.496019][ C1] [<80819fd4>] (refcount_warn_saturate) from [<8146782c>] (sk_skb_reason_drop+0x1d8/0x248) [ 436.496369][ C1] [<81467654>] (sk_skb_reason_drop) from [<817f4e34>] (j1939_session_destroy+0x78/0x200) [ 436.496786][ C1] r9:00000003 r8:00000001 r7:8365581c r6:85418750 r5:85418700 r4:838ed0c0 [ 436.497070][ C1] [<817f4dbc>] (j1939_session_destroy) from [<817f5620>] (j1939_xtp_rx_abort_one+0xbc/0x2a4) [ 436.497422][ C1] r6:83655000 r5:85418700 r4:838edd80 [ 436.497637][ C1] [<817f5564>] (j1939_xtp_rx_abort_one) from [<817f83d8>] (j1939_tp_recv+0x4c4/0x530) [ 436.497989][ C1] r9:00000040 r8:84297d50 r7:83655000 r6:83655008 r5:83655000 r4:838edd80 [ 436.498269][ C1] [<817f7f14>] (j1939_tp_recv) from [<817f1da0>] (j1939_can_recv+0x1e4/0x2dc) [ 436.498552][ C1] r7:83655000 r6:83655008 r5:83655810 r4:838edd80 [ 436.498785][ C1] [<817f1bbc>] (j1939_can_recv) from [<817e7b6c>] (can_rcv_filter+0x9c/0x218) [ 436.499104][ C1] r9:00000040 r8:844286a0 r7:98ec0000 r6:838edc00 r5:00000001 r4:843d2e10 [ 436.499397][ C1] [<817e7ad0>] (can_rcv_filter) from [<817e8510>] (can_receive+0xb4/0xf0) [ 436.499738][ C1] r9:00000040 r8:00000000 r7:84428000 r6:8480ecc0 r5:844e0000 r4:838edc00 [ 436.500035][ C1] [<817e845c>] (can_receive) from [<817e85d0>] (can_rcv+0x84/0xac) [ 436.500361][ C1] r9:00000040 r8:00000002 r7:00000000 r6:00000000 r5:817e854c r4:838edc00 [ 436.501285][ C1] [<817e854c>] (can_rcv) from [<814886a4>] (__netif_receive_skb_one_core+0x5c/0x80) [ 436.501719][ C1] r5:817e854c r4:84428000 [ 436.501916][ C1] [<81488648>] (__netif_receive_skb_one_core) from [<81488710>] (__netif_receive_skb+0x18/0x5c) [ 436.502857][ C1] r5:ddde4fb0 r4:838edc00 [ 436.503438][ C1] [<814886f8>] (__netif_receive_skb) from [<81488a00>] (process_backlog+0x88/0x15c) [ 436.503862][ C1] r5:ddde4fb0 r4:838edc00 [ 436.504055][ C1] [<81488978>] (process_backlog) from [<81489904>] (__napi_poll+0x34/0x240) [ 436.504452][ C1] r10:ddde4ec0 r9:ddde5100 r8:df879e38 r7:df879e33 r6:00000040 r5:ddde4fb0 [ 436.504836][ C1] r4:00000001 [ 436.505030][ C1] [<814898d0>] (__napi_poll) from [<8148a13c>] (net_rx_action+0x338/0x420) [ 436.505367][ C1] r9:ddde5100 r8:df879e38 r7:0000012c r6:0000354d r5:ddde4fb0 r4:00000000 [ 436.505669][ C1] [<81489e04>] (net_rx_action) from [<8024b5d8>] (handle_softirqs+0x15c/0x468) [ 436.506048][ C1] r10:00000008 r9:82e42400 r8:00000100 r7:04208040 r6:00000003 r5:00000004 [ 436.506428][ C1] r4:8260408c [ 436.506643][ C1] [<8024b47c>] (handle_softirqs) from [<8024b928>] (run_ksoftirqd+0x44/0x4c) [ 436.506990][ C1] r10:00000000 r9:00000002 r8:826240c8 r7:00000001 r6:82cc7440 r5:82e42400 [ 436.507430][ C1] r4:00000001 [ 436.507630][ C1] [<8024b8e4>] (run_ksoftirqd) from [<80274f1c>] (smpboot_thread_fn+0x16c/0x288) [ 436.507970][ C1] [<80274db0>] (smpboot_thread_fn) from [<8026faf4>] (kthread+0x104/0x134) [ 436.508292][ C1] r10:00000000 r9:df819d60 r8:82cc76c0 r7:82cc7440 r6:80274db0 r5:82e42400 [ 436.508577][ C1] r4:82cc75c0 r3:00000000 [ 436.508791][ C1] [<8026f9f0>] (kthread) from [<80200114>] (ret_from_fork+0x14/0x20) [ 436.509203][ C1] Exception stack(0xdf879fb0 to 0xdf879ff8) [ 436.509566][ C1] 9fa0: 00000000 00000000 00000000 00000000 [ 436.509911][ C1] 9fc0: 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 [ 436.510186][ C1] 9fe0: 00000000 00000000 00000000 00000000 00000013 00000000 [ 436.510486][ C1] r9:00000000 r8:00000000 r7:00000000 r6:00000000 r5:8026f9f0 r4:82cc75c0 [ 436.512153][ C1] Rebooting in 86400 seconds.. VM DIAGNOSIS: 19:55:03 Registers: info registers vcpu 0 CPU#0 R00=827b8f38 R01=821af29c R02=9dd9e600 R03=819867e8 R04=828b2640 R05=00015476 R06=00015476 R07=83a00800 R08=dddc7270 R09=dddc72c0 R10=00000065 R11=df801e6c R12=df801e70 R13=df801e60 R14=8120b224 R15=819867f8 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000 info registers vcpu 1 CPU#1 R00=df879636 R01=81966cb8 R02=00000000 R03=00000000 R04=df8799de R05=df8799d8 R06=81ff920b R07=81966cb8 R08=81ff920b R09=df879948 R10=df8799d8 R11=df879620 R12=df879624 R13=df879614 R14=80321628 R15=80321504 PSR=60000193 -ZC- A S svc32 s00=00000000 s01=00000000 d00=0000000000000000 s02=00000000 s03=00000000 d01=0000000000000000 s04=00000000 s05=00000000 d02=0000000000000000 s06=00000000 s07=00000000 d03=0000000000000000 s08=00000000 s09=00000000 d04=0000000000000000 s10=00000000 s11=00000000 d05=0000000000000000 s12=00000000 s13=00000000 d06=0000000000000000 s14=00000000 s15=00000000 d07=0000000000000000 s16=00000000 s17=00000000 d08=0000000000000000 s18=00000000 s19=00000000 d09=0000000000000000 s20=00000000 s21=00000000 d10=0000000000000000 s22=00000000 s23=00000000 d11=0000000000000000 s24=00000000 s25=00000000 d12=0000000000000000 s26=00000000 s27=00000000 d13=0000000000000000 s28=00000000 s29=00000000 d14=0000000000000000 s30=00000000 s31=00000000 d15=0000000000000000 s32=00000000 s33=00000000 d16=0000000000000000 s34=00000000 s35=00000000 d17=0000000000000000 s36=00000000 s37=00000000 d18=0000000000000000 s38=00000000 s39=00000000 d19=0000000000000000 s40=00000000 s41=00000000 d20=0000000000000000 s42=00000000 s43=00000000 d21=0000000000000000 s44=00000000 s45=00000000 d22=0000000000000000 s46=00000000 s47=00000000 d23=0000000000000000 s48=00000000 s49=00000000 d24=0000000000000000 s50=00000000 s51=00000000 d25=0000000000000000 s52=00000000 s53=00000000 d26=0000000000000000 s54=00000000 s55=00000000 d27=0000000000000000 s56=00000000 s57=00000000 d28=0000000000000000 s58=00000000 s59=00000000 d29=0000000000000000 s60=00000000 s61=00000000 d30=0000000000000000 s62=00000000 s63=00000000 d31=0000000000000000 FPSCR: 00000000